✦ Luna Orbit — Cybersecurity

Identity and Access Management (IAM) – OKTA Engineer/Architect (US Citizenship Required)

at Exor Solutions Inc

📍 Remote, US Remote 💰 $165K – $185K USD / year Posted April 14, 2026
Salary $165K – $185K USD / year
Type Not Specified
Experience executive
Exp. Years 8+ years
Education Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience)
Category Cybersecurity

Remote IAM architect role focused on leading design, implementation, and optimization of Okta-based enterprise Identity and Access Management solutions. You will own core identity capabilities like SSO, MFA, lifecycle management, federation, integrations, governance, and incident remediation.

  • Lead architecture, design, and implementation of enterprise IAM solutions using Okta
  • Define and implement SSO, MFA, lifecycle management, and federation strategies
  • Architect and oversee Okta integrations with enterprise applications and cloud platforms
  • Establish and enforce IAM governance, policies, and standards aligned with NIST and Zero Trust
  • Lead incident response and perform security assessments, audits, and risk analysis

Architect and implement Okta identity solutions using SAML, OAuth 2.0, and OpenID Connect (OIDC), integrating with Active Directory/LDAP and cloud platforms such as Amazon Web Services, Azure, and Google Cloud. Build robust IAM governance and Zero Trust/ICAM-aligned access controls (RBAC/ABAC), and support incident response with security assessments, audits, and risk analysis.

The ideal candidate is an Okta-focused IAM architect with 8+ years of Identity and Access Management (IAM) experience, including designing and deploying enterprise Okta solutions. They have deep expertise in SAML, OAuth 2.0, OpenID Connect (OIDC), and integration with Active Directory/LDAP and cloud platforms like Amazon Web Services, Azure, and Google Cloud—paired with strong Zero Trust and governance experience.

Identity and Access Management (IAM)OktaSingle Sign-On (SSO)Multi-Factor Authentication (MFA)lifecycle managementfederation strategiesOkta integrationsIAM governancepoliciesand standards aligned with security frameworks and compliance requirementsidentity lifecycle management processes including provisioning and deprovisioningrole-based access control (RBAC/ABAC)authentication and federation protocolsSAMLOAuth 2.0OpenID Connect (OIDC)Active Directory / LDAPZero Trust architectureAPI integrationsmicroservices-based architecturesGitCI/CD pipelinesSQL and data analysis
SailPointPing IdentityDevSecOpscloud-native architecturefederal environments (DHSDOJCBPDEA)NIST SP 800-63 compliance
OktaAmazon Web ServicesAWSMicrosoft AzureAzureGoogle CloudActive DirectoryLDAPGitCI/CD pipelinesSQL
Identity and Access Management (IAM)OktaSingle Sign-On (SSO)Multi-Factor Authentication (MFA)lifecycle managementfederation strategiesidentity lifecycle managementprovisioningdeprovisioningRBACABACOkta integrationsActive Directory / LDAPAWSAzureGoogle CloudZero Trust architectureICAM principlesAPI integrationsweb servicesmicroservices-based architecturesGitCI/CD pipelinesSQLincident responsesecurity assessmentsauditsrisk analysisNIST
Identity and Access Management (IAM)Okta architectureSingle Sign-On (SSO)Multi-Factor Authentication (MFA)lifecycle managementfederationidentity lifecycle managementprovisioningdeprovisioningrole-based access control (RBAC)attribute-based access control (ABAC)Okta integrationsintegration across cloud and on-premises environmentsenterprise application integrationfederation strategiesIAM governanceIAM policies and standardsNISTZero Trust architectureICAM principlessystem performancescalabilitysecurity posture optimizationincident responseremediationsecurity assessmentsauditsrisk analysissecurity compliance alignmentauthentication protocolsSAMLOAuth 2.0OpenID Connect (OIDC)Active Directory / LDAPAmazon Web ServicesAzureGoogle CloudAPI integrationsweb servicesmicroservices-based architecturesGitCI/CD pipelinesSQLdata analysisIAM reporting
technical leadershipguidance to engineerscross-functional collaborationcommunicationstakeholder managementproblem-solvingrisk-aware thinkingcontinuous improvementincident coordination

Preferred

Okta Certified ProfessionalOkta Certified AdministratorOkta Certified Consultant
Industry SaaS / Technology / Enterprise Security
Job Function Architect and deliver enterprise Okta-based identity and access management solutions.
Role Subtype Identity & Access Management Engineer
Tech Domains Cybersecurity, Active Directory, Microsoft 365, Azure, Amazon Web Services, Google Cloud Platform
Identity and Access Management (IAM)Okta ArchitectOktaarchitecture design implementationSingle Sign-On (SSO)Multi-Factor Authentication (MFA)lifecycle managementfederation strategiesprovisioningdeprovisioningrole-based access control (RBAC)attribute-based access control (ABAC)Okta integrationsActive DirectoryLDAPSAMLOAuth 2.0OpenID Connect (OIDC)Zero TrustICAMincident responserisk analysissecurity assessmentsNISTAPI integrationsGitCI/CD pipelinesSQL

Must have 8+ years of experience in Identity and Access Management with strong Okta expertise, Must be able to architect and deploy Okta solutions in enterprise environments, Must have deep knowledge of SAML, OAuth 2.0, and OpenID Connect (OIDC)

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile